If NAT is switched on for an interface, this table contains
an entry for each session running over the interface. Table
entries are creates by the system whenever a valid session
is established. A session may be either a tcp connection,
a udp connection or an icmp connection with icmp-echo messages
(ping). A valid session is either an outgoing session or
an incoming session specified in the ipNatPresetTable.
Everything behind an interface with NAT enabled is called
outside. The BRICK itself and all networks connected
to it via interfaces without NAT are called inside.
Table entries are removed after timeout. This timeout
is
specified by ipExtIfNatOtherTimeout for UDP
and ICMP sessions.
specified by ipExtIfTcpTimeout for TCP sessions
16 seconds for closed TCP-sessions (FIN has been
received and acknowledged in both directions.
Parsed from file mibip.mib.txt
Company: None
Module: BIANCA-BRICK-IP-MIB
If NAT is switched on for an interface, this table contains
an entry for each session running over the interface. Table
entries are creates by the system whenever a valid session
is established. A session may be either a tcp connection,
a udp connection or an icmp connection with icmp-echo messages
(ping). A valid session is either an outgoing session or
an incoming session specified in the ipNatPresetTable.
Everything behind an interface with NAT enabled is called
outside. The BRICK itself and all networks connected
to it via interfaces without NAT are called inside.
Table entries are removed after timeout. This timeout
is
specified by ipExtIfNatOtherTimeout for UDP
and ICMP sessions.
specified by ipExtIfTcpTimeout for TCP sessions
16 seconds for closed TCP-sessions (FIN has been
received and acknowledged in both directions.
Parsed from file BIANCA-BRICK-IP-MIB.mib
Module: BIANCA-BRICK-IP-MIB
Vendor: BinTec Communications GmbH
Module: BIANCA-BRICK-IP-MIB
[Automatically extracted from oidview.com]
ipNatTable OBJECT-TYPE SYNTAX SEQUENCE OF IpNatEntry ACCESS not-accessible STATUS mandatory DESCRIPTION "If NAT is switched on for an interface, this table contains an entry for each session running over the interface. Table entries are creates by the system whenever a valid session is established. A session may be either a tcp connection, a udp connection or an icmp connection with icmp-echo messages (ping). A valid session is either an outgoing session or an incoming session specified in the ipNatPresetTable. Everything behind an interface with NAT enabled is called outside. The BRICK itself and all networks connected to it via interfaces without NAT are called inside. Table entries are removed after timeout. This timeout is specified by ipExtIfNatOtherTimeout for UDP and ICMP sessions. specified by ipExtIfTcpTimeout for TCP sessions 16 seconds for closed TCP-sessions (FIN has been received and acknowledged in both directions. " ::= { biboip 5 }
ipNatTable OBJECT-TYPE SYNTAX SEQUENCE OF IpNatEntry ACCESS not-accessible STATUS mandatory DESCRIPTION "If NAT is switched on for an interface, this table contains an entry for each session running over the interface. Table entries are creates by the system whenever a valid session is established. A session may be either a tcp connection, a udp connection or an icmp connection with icmp-echo messages (ping). A valid session is either an outgoing session or an incoming session specified in the ipNatPresetTable. Everything behind an interface with NAT enabled is called outside. The BRICK itself and all networks connected to it via interfaces without NAT are called inside. Table entries are removed after timeout. This timeout is specified by ipExtIfNatOtherTimeout for UDP and ICMP sessions. specified by ipExtIfTcpTimeout for TCP sessions 16 seconds for closed TCP-sessions (FIN has been received and acknowledged in both directions. " ::= { biboip 5 }
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.272.4.5.5.1 | ipNatEntry | 11 | 11 | None |
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.272.4.5.1 | ipAllowTable | 1 | 15 | The ipAllowTable defines all allowed IP packets. Each entry describes a subset of IP Packets, which are allowed to be processed. … |
1.3.6.1.4.1.272.4.5.2 | ipDenyTable | 1 | 15 | The ipDenyTable defines all IP packets to be denied. Each entry describes a subset of IP Packets, which are denied processing. Th… |
1.3.6.1.4.1.272.4.5.3 | ipExtIfTable | 1 | 36 | ipExtIftable |
1.3.6.1.4.1.272.4.5.4 | ipExtRtTable | 1 | 24 | The ipExtRtTable can be used in addition (not instead of) to the ipRouteTable to specify routing of IP datagrams. The selection o… |
1.3.6.1.4.1.272.4.5.6 | ipNatPresetTable | 1 | 12 | This table specifies the IP addresses and port numbers for sessions requested from outside. If this table is empty and NAT is ena… |
1.3.6.1.4.1.272.4.5.7 | ipSessionTable | 1 | 14 | None |
1.3.6.1.4.1.272.4.5.8 | ipDhcpTable | 1 | 9 | None |
1.3.6.1.4.1.272.4.5.9 | ipDhcpInUseTable | 1 | 4 | None |
1.3.6.1.4.1.272.4.5.10 | ospfStat | 12 | 24 | None |
1.3.6.1.4.1.272.4.5.11 | ospfErr | 23 | 46 | None |
1.3.6.1.4.1.272.4.5.12 | ipImportTable | 1 | 10 | This table specifies how routes from one routing protocol are imported into another routing protocol. The dummy protocol default-… |
1.3.6.1.4.1.272.4.5.13 | ipPriorityTable | 1 | 3 | This table defines the order, in which routes from different protocols are being used to determine the destination of an ip packe… |
1.3.6.1.4.1.272.4.5.14 | biboipsrv | 2 | 16 | None |
1.3.6.1.4.1.272.4.5.15 | ipFilterTable | 1 | 16 | The ipFilterTable defines filters that describe subsets of IP packets. The filter matches if all conditions defined are true when… |
1.3.6.1.4.1.272.4.5.16 | ipRuleTable | 1 | 5 | The ipRuleTable defines access rules for checking incoming IP packets. The rules are processed in order, i.e. each rule has a lin… |
1.3.6.1.4.1.272.4.5.17 | ipTafTable | 1 | 6 | ipTaftable |
1.3.6.1.4.1.272.4.5.18 | ipNatOutTable | 1 | 13 | This table specifies the IP address translation for outgoing sessions. If no matching entry is found the IP address is set to the… |
1.3.6.1.4.1.272.4.5.19 | ipHostsAliveTable | 1 | 9 | This table specifies the watched IP addresses. Entries in the table are created and removed manually by network management. |
1.3.6.1.4.1.272.4.5.20 | ipDns | 17 | 43 | None |
1.3.6.1.4.1.272.4.5.21 | ipBodRuleTable | 1 | 9 | The ipBodRuleTable defines access rules for checking incoming IP packets. The rules are processed in order, i.e. each rule has a … |
1.3.6.1.4.1.272.4.5.22 | ipQoSTable | 1 | 11 | The ipQosTable defines the classifier rules that are applied to IP traffic arriving this interface in a particular direction. The… |
1.3.6.1.4.1.272.4.5.23 | ipRipTimerTable | 1 | 11 | The 'ipRipTimerTable' contains the basic configuration of the RIP protocol. Formerly created to define only the 3 timers involved… |
1.3.6.1.4.1.272.4.5.24 | ipPublishTable | 1 | 15 | ipPublishtable |
1.3.6.1.4.1.272.4.5.25 | ipDhcpClientTable | 1 | 7 | None |
1.3.6.1.4.1.272.4.5.26 | ipDynDnsProviderTable | 1 | 8 | None |
1.3.6.1.4.1.272.4.5.27 | biboping | 1 | 14 | None |
1.3.6.1.4.1.272.4.5.28 | ipSifAliasAddressTable | 1 | 7 | Contains a alias Address Entry Index,Ip,Mask,Interface |
1.3.6.1.4.1.272.4.5.29 | ipSifAliasServiceTable | 1 | 6 | Contains a alias Service Entry Protocol,Port,Range |
1.3.6.1.4.1.272.4.5.30 | ipSifAliasTable | 1 | 6 | Contains both static and temporary entries of DNS records |
1.3.6.1.4.1.272.4.5.31 | ipSifRejectTable | 1 | 9 | Contains actually rejected Frames with Source Destination |
1.3.6.1.4.1.272.4.5.32 | ipIcmp | 9 | 18 | None |
1.3.6.1.4.1.272.4.5.33 | ipRipFilterTable | 1 | 10 | The ipRipFilterTable contains additional information related to IP and the interfaces found on the system. Entries can only be ad… |
1.3.6.1.4.1.272.4.5.34 | ipNatExpTable | 1 | 8 | If NAT is switched on for an interface, this table contains entries for expected sessions. Table entries are creates by the syste… |
1.3.6.1.4.1.272.4.5.35 | ipSifExpectTable | 1 | 7 | Contains expected Sessions with Source Destination |
1.3.6.1.4.1.272.4.5.37 | ipSif | 5 | 10 | None |